CVE-2026-2836: Vulnerability in Cloudflare https://github.com/cloudflare/pingora
A cache poisoning vulnerability has been found in the Pingora HTTP proxy framework’s default cache key construction. The issue occurs because the default HTTP cache key implementation generates cache keys using only the URI path, excluding critical factors such as the host header (authority). Operators relying on the default are vulnerable to cache poisoning, and cross-origin responses may be improperly served to users. Impact This vulnerability affects users of Pingora's alpha proxy caching feature who relied on the default CacheKey implementation. An attacker could exploit this for: * Cross-tenant data leakage: In multi-tenant deployments, poison the cache so that users from one tenant receive cached responses from another tenant * Cache poisoning attacks: Serve malicious content to legitimate users by poisoning shared cache entries Cloudflare's CDN infrastructure was not affected by this vulnerability, as Cloudflare's default cache key implementation uses multiple factors to prevent cache key poisoning and never made use of the previously provided default. Mitigation: We strongly recommend Pingora users to upgrade to Pingora v0.8.0 or higher, which removes the insecure default cache key implementation. Users must now explicitly implement their own callback that includes appropriate factors such as Host header, origin server HTTP scheme, and other attributes their cache should vary on. Pingora users on previous versions may also remove any of their default CacheKey usage and implement their own that should at minimum include the host header / authority and upstream peer’s HTTP scheme.
AI Analysis
Technical Summary
CVE-2026-2836 identifies a cache poisoning vulnerability in the Pingora HTTP proxy framework, specifically in its default cache key construction used in the alpha proxy caching feature. The vulnerability arises because the default cache key implementation generates keys solely based on the URI path, omitting critical components such as the host header (authority) and the upstream peer’s HTTP scheme. This flawed design allows an attacker to poison the cache by injecting malicious or cross-origin responses that are then served to other users, potentially from different tenants in multi-tenant deployments. The impact includes cross-tenant data leakage, where one tenant may receive cached responses intended for another, and cache poisoning attacks that can deliver malicious content to legitimate users. Cloudflare’s own CDN infrastructure is unaffected as it employs a more comprehensive cache key strategy that incorporates multiple factors to prevent such poisoning. The vulnerability affects Pingora versions prior to 0.8.0, which used the insecure default cache key. Exploitation requires no privileges and no authentication but does require user interaction (e.g., triggering cached requests). The CVSS 4.0 score is 8.4 (high), reflecting the ease of exploitation and significant confidentiality and integrity impacts. Mitigation requires upgrading to Pingora v0.8.0 or later, which removes the insecure default and mandates explicit cache key callback implementations that include the host header, HTTP scheme, and other relevant attributes. Users on earlier versions should replace default cache key usage with custom implementations that at minimum consider the host header and upstream peer scheme to prevent cache poisoning.
Potential Impact
The vulnerability poses a significant risk to organizations using Pingora’s alpha proxy caching feature with default cache key settings, especially in multi-tenant environments. Attackers can exploit this flaw to poison caches, leading to cross-tenant data leakage where sensitive information from one tenant is exposed to another. Additionally, cache poisoning can be used to serve malicious content to legitimate users, potentially facilitating phishing, malware distribution, or other attacks. This undermines the confidentiality and integrity of cached data and can damage trust in the affected services. Since the vulnerability requires no privileges and no authentication, it can be exploited by remote attackers with minimal barriers, increasing the risk of widespread abuse. However, the scope is limited to deployments using the vulnerable Pingora versions and default cache key implementations. Cloudflare’s own CDN infrastructure is not impacted, limiting the risk to third-party users of Pingora. Organizations relying on Pingora for HTTP proxy caching must address this vulnerability promptly to avoid data leakage and malicious content delivery.
Mitigation Recommendations
1. Upgrade immediately to Pingora version 0.8.0 or higher, which removes the insecure default cache key implementation. 2. For users unable to upgrade promptly, remove any usage of the default CacheKey implementation and develop a custom cache key callback that includes at minimum the host header (authority) and the upstream peer’s HTTP scheme. 3. Ensure that cache keys vary on all relevant HTTP request attributes that distinguish tenants or origins, such as Host header, scheme, and any other headers or parameters critical to cache partitioning. 4. Conduct thorough testing of cache behavior after implementing custom cache keys to verify that cross-origin or cross-tenant cache poisoning is not possible. 5. Monitor proxy logs for unusual cache hits or responses that may indicate attempted cache poisoning. 6. Educate development and operations teams about the importance of proper cache key construction in proxy caching to prevent similar vulnerabilities. 7. Review and audit other caching layers or proxies in the environment to ensure they do not suffer from similar cache key construction issues.
Affected Countries
United States, Germany, United Kingdom, France, Japan, South Korea, Canada, Australia, Netherlands, Singapore
CVE-2026-2836: Vulnerability in Cloudflare https://github.com/cloudflare/pingora
Description
A cache poisoning vulnerability has been found in the Pingora HTTP proxy framework’s default cache key construction. The issue occurs because the default HTTP cache key implementation generates cache keys using only the URI path, excluding critical factors such as the host header (authority). Operators relying on the default are vulnerable to cache poisoning, and cross-origin responses may be improperly served to users. Impact This vulnerability affects users of Pingora's alpha proxy caching feature who relied on the default CacheKey implementation. An attacker could exploit this for: * Cross-tenant data leakage: In multi-tenant deployments, poison the cache so that users from one tenant receive cached responses from another tenant * Cache poisoning attacks: Serve malicious content to legitimate users by poisoning shared cache entries Cloudflare's CDN infrastructure was not affected by this vulnerability, as Cloudflare's default cache key implementation uses multiple factors to prevent cache key poisoning and never made use of the previously provided default. Mitigation: We strongly recommend Pingora users to upgrade to Pingora v0.8.0 or higher, which removes the insecure default cache key implementation. Users must now explicitly implement their own callback that includes appropriate factors such as Host header, origin server HTTP scheme, and other attributes their cache should vary on. Pingora users on previous versions may also remove any of their default CacheKey usage and implement their own that should at minimum include the host header / authority and upstream peer’s HTTP scheme.
AI-Powered Analysis
Technical Analysis
CVE-2026-2836 identifies a cache poisoning vulnerability in the Pingora HTTP proxy framework, specifically in its default cache key construction used in the alpha proxy caching feature. The vulnerability arises because the default cache key implementation generates keys solely based on the URI path, omitting critical components such as the host header (authority) and the upstream peer’s HTTP scheme. This flawed design allows an attacker to poison the cache by injecting malicious or cross-origin responses that are then served to other users, potentially from different tenants in multi-tenant deployments. The impact includes cross-tenant data leakage, where one tenant may receive cached responses intended for another, and cache poisoning attacks that can deliver malicious content to legitimate users. Cloudflare’s own CDN infrastructure is unaffected as it employs a more comprehensive cache key strategy that incorporates multiple factors to prevent such poisoning. The vulnerability affects Pingora versions prior to 0.8.0, which used the insecure default cache key. Exploitation requires no privileges and no authentication but does require user interaction (e.g., triggering cached requests). The CVSS 4.0 score is 8.4 (high), reflecting the ease of exploitation and significant confidentiality and integrity impacts. Mitigation requires upgrading to Pingora v0.8.0 or later, which removes the insecure default and mandates explicit cache key callback implementations that include the host header, HTTP scheme, and other relevant attributes. Users on earlier versions should replace default cache key usage with custom implementations that at minimum consider the host header and upstream peer scheme to prevent cache poisoning.
Potential Impact
The vulnerability poses a significant risk to organizations using Pingora’s alpha proxy caching feature with default cache key settings, especially in multi-tenant environments. Attackers can exploit this flaw to poison caches, leading to cross-tenant data leakage where sensitive information from one tenant is exposed to another. Additionally, cache poisoning can be used to serve malicious content to legitimate users, potentially facilitating phishing, malware distribution, or other attacks. This undermines the confidentiality and integrity of cached data and can damage trust in the affected services. Since the vulnerability requires no privileges and no authentication, it can be exploited by remote attackers with minimal barriers, increasing the risk of widespread abuse. However, the scope is limited to deployments using the vulnerable Pingora versions and default cache key implementations. Cloudflare’s own CDN infrastructure is not impacted, limiting the risk to third-party users of Pingora. Organizations relying on Pingora for HTTP proxy caching must address this vulnerability promptly to avoid data leakage and malicious content delivery.
Mitigation Recommendations
1. Upgrade immediately to Pingora version 0.8.0 or higher, which removes the insecure default cache key implementation. 2. For users unable to upgrade promptly, remove any usage of the default CacheKey implementation and develop a custom cache key callback that includes at minimum the host header (authority) and the upstream peer’s HTTP scheme. 3. Ensure that cache keys vary on all relevant HTTP request attributes that distinguish tenants or origins, such as Host header, scheme, and any other headers or parameters critical to cache partitioning. 4. Conduct thorough testing of cache behavior after implementing custom cache keys to verify that cross-origin or cross-tenant cache poisoning is not possible. 5. Monitor proxy logs for unusual cache hits or responses that may indicate attempted cache poisoning. 6. Educate development and operations teams about the importance of proper cache key construction in proxy caching to prevent similar vulnerabilities. 7. Review and audit other caching layers or proxies in the environment to ensure they do not suffer from similar cache key construction issues.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- cloudflare
- Date Reserved
- 2026-02-19T21:33:42.425Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69a8c847d1a09e29cb860502
Added to database: 3/5/2026, 12:03:19 AM
Last enriched: 3/5/2026, 12:17:33 AM
Last updated: 3/5/2026, 3:23:56 AM
Views: 22
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-29127: CWE-269 Improper Privilege Management in International Datacasting Corporation SFX2100 Satellite Receiver
CriticalCVE-2026-26034: Incorrect default permissions in Dell Inc. UPS Multi-UPS Management Console (MUMC)
HighCVE-2026-26033: Unquoted search path or element in Dell Inc. UPS Multi-UPS Management Console (MUMC)
MediumCVE-2024-57854: CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in DOUGDUDE Net::NSCA::Client
UnknownCVE-2026-3381: CWE-1395 Dependency on Vulnerable Third-Party Component in PMQS Compress::Raw::Zlib
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.